c6fc / warcannonLinks
High speed/Low cost CommonCrawl RegExp in Node.js
โ255Updated last year
Alternatives and similar repositories for warcannon
Users that are interested in warcannon are comparing it to the libraries listed below
Sorting:
- Find cloud assets that no one wants exposed ๐ โ๏ธโ348Updated 5 years ago
- scylla.sh db dumps and moreโ138Updated 5 years ago
- Subdomain finderโ369Updated last year
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filteringโ210Updated 4 years ago
- automated web assets enumeration & scanning [DEPRECATED]โ289Updated 2 years ago
- Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious Sโฆโ236Updated last year
- Fast and stealthy Amazon S3 bucket enumeration tool for pentesters.โ254Updated last month
- A wordlist that is kept up to date with the latest headlines to provide relevant words to human societyโ122Updated 3 years ago
- โ81Updated 3 years ago
- Collection of scripts & fingerprinting tricks for Shodan.ioโ253Updated 5 years ago
- A tool to hunt for credentials in github wild AKA git*huntโ297Updated 2 years ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used tโฆโ245Updated 2 weeks ago
- โ258Updated last year
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raiderโ139Updated 4 years ago
- FestIn - Open S3 Bucket Scannerโ233Updated 4 years ago
- Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered foโฆโ203Updated 2 years ago
- An open source intelligence tool to crawl the graph of certificate Alternate Namesโ357Updated 3 weeks ago
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registrationโ301Updated last week
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes โฆโ262Updated 2 years ago
- Open a DNS server that knows no records but records every request. Used for DNS exfiltration.โ68Updated 3 years ago
- Search exposed EBS volumes for secretsโ299Updated 2 years ago
- A phased, evasive Path Traversal + LFI scanning & exploitation tool in Pythonโ199Updated 3 years ago
- Scrapts Scrapts Scraptsโ240Updated last year
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Searchโ186Updated last year
- Weaponizing Live CT logs for automated monitoring ofย assetsโ134Updated 4 years ago
- A Google/Bing Scraping tool for LinkedInโ93Updated 2 years ago
- Tools to assess the DNS security of web applicationsโ128Updated 2 years ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaboratorโ168Updated 4 years ago
- These are the regexes that power truffleHogโ219Updated 2 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger toolโ267Updated 2 years ago